Tuesday , August 12 2025

Successfully held “InfoSecCon-2024″at Dhaka Bangladesh

With a festive look and the participation of more than one hundred participants from Bangladesh cyber industry, another successful cyber security conference “InfoSecCon-2024” (2nd Edition) was held at Dhaka on 26 October (Saturday) 2nd time in a year.

The very flagship event was designed with five time demanding topic including AI, Data center, Cloud service and so on and academician, researchers, professionals, Student, Banker participated the event.

SoupDealer Malware Bypasses Every Sandbox, AV’s, XDR/EDR in Real-World Incidents

In early August 2025, cybersecurity teams in Türkiye detected a new Java-based loader that avoided detection by all public sandboxes,...
Read More
SoupDealer Malware Bypasses Every Sandbox, AV’s, XDR/EDR in Real-World Incidents

WinRAR Zero-Day and 7-Zip Vulnerability actively exploited

ESET researchers found a zero-day vulnerability in WinRAR for Windows, tracked as CVE-2025-8088, which has been used to run malicious...
Read More
WinRAR Zero-Day and 7-Zip Vulnerability actively exploited

Biometric Clone: ₹5.58 crore loss, 251 accounts in 17 districts

A sophisticated cyber fraud has stolen over ₹5.58 crore from many bank accounts, highlighting serious concerns about digital payment security....
Read More
Biometric Clone: ₹5.58 crore loss, 251 accounts in 17 districts

Google Confirms Data Breach: Notifying Affected Users

Google confirmed that a recent data breach in one of its Salesforce CRM systems exposed information about potential Google Ads...
Read More
Google Confirms Data Breach: Notifying Affected Users

28,000+ Microsoft Exchange Servers Exposed Online for CVE-2025-53786

More than 28,000 unpatched Microsoft Exchange servers are publicly accessible and vulnerable to the critical security flaw CVE-2025-53786, as reported...
Read More
28,000+ Microsoft Exchange Servers Exposed Online for CVE-2025-53786

Google alerts of cloud storage bucket hijacking attacks

Google has unveiled its best practices aimed at thwarting dangling bucket takeovers, encouraging developers to fortify their cloud environments. The...
Read More
Google alerts of cloud storage bucket hijacking attacks

Multiple 0-days to Bypass BitLocker and Extract Data

Researchers revealed critical zero-day vulnerabilities that bypass Windows BitLocker encryption, enabling attackers with physical access to quickly extract data from...
Read More
Multiple 0-days to Bypass BitLocker and Extract Data

Amazon ECS Internal Protocol Exploited to Steal AWS Credentials

Security researchers disclosed a cirtical flaw in Amazon Elastic Container Service (ECS) that enables harmful containers to steal AWS credentials...
Read More
Amazon ECS Internal Protocol Exploited to Steal AWS Credentials

7 Tools for Automated Server Patching

Let’s look at 7 tools for automating patch deployment. Each tool offers unique features for various environments, from small DevOps...
Read More
7 Tools for Automated Server Patching

Germany’s top court rules police may use spyware solely for serious crimes

Germany's top court ruled on Thursday that police can secretly install spy software on phones and computers only for serious...
Read More
Germany’s top court rules police may use spyware solely for serious crimes
table talk
Panelists at “AI-Driven Incident Response: Automating Cyber Security with GenAI”

In the topic titled “AI-Driven Incident Response: Automating Cyber Security with GenAI” where Dr. Md. Shohrab Hossain, Professor, CSE, BUET, Reazul Islam, Chief Operating Officer, ADN technologies Ltd and Sifat Jahan Noor, Chief Information Officer, Bashundhara Group were participated.

The panelists said, AI-driven incident response uses Generative AI to improve cybersecurity by automating threat detection, analysis, and response. As cyber threats become more sophisticated, traditional methods struggle to keep up. GenAI can quickly analyze large datasets, identifying anomalies and potential breaches more efficiently than human analysts.

table talk Panelists at “Future Prospects for Data Center and cloud services in Bangladesh with business continuity”

On the topic “Future Prospects for Data Center and cloud services in Bangladesh with business continuity”, Md. Ishaque Miah, Managing Director, Bangladesh Data Center and Disaster Recovery Site Ltd, Sharful Alam, Chief Executive Officer, Felicity IDC Limited, Masud Parvaj, Managing Director, DCiCON Limited and MD. Hasibur Rashid, Director & CMO of Intercloud Limited were participated as panelists.

The panelists said, Bangladesh is witnessing rapid digital transformation, driven by increasing internet penetration and a growing demand for data-driven services. The future of data centers and cloud services in the country looks promising for various reasons like growing demand, investment and infrastructure development, Business Continuity Focus and so on. So, policy support, trust gap minimizing, collaboration is essential for the expansion the industry.

table talk
panelists at : “The Rise of DNS Attacks: From DDoS to Cache Poisoning”

On the topic “The Rise of DNS Attacks: From DDoS to Cache Poisoning” was discussed by Prof. Dr. Md. Saiful Islam, IICT, BUET, Dr. Md. Mamun-Or-Rashid, Professor, CSE, Dhaka University and Abu Zafor Md. Ahasanul Hoque (Uzzal), DGM, Core and Upstream, BTCL.

The learned talker successfully presented the Domain Name System (DNS) translates easy-to-remember domain names into IP addresses, but its significance also makes it a target for cyberattacks. The increase in these attacks highlights the need for strong DNS security, such as implementing DNSSEC and improving monitoring practices. Securing DNS infrastructure is crucial as the internet evolves.

table talk
panelists at “Cyber Security in Telco & BFSI”

On the topic “Cyber Security in Telco & BFSI”, Sanjoy Chakraborty, Associate Director, Cyber Security, Robi, Shahadat Hossain, Principal Engineer, Enterprise and Saiful Islam, FVP & CISO, Dhaka Bank PLC were participated where the the panelists highlighted the various dimension of telco and BFSI security.

And finally in the Questions & Answer (Q&A), Fahad Zaman Chowdhury, Joint Director, ICT, Bangladesh Bank, Dr. B M Mainul Hossain, Director (IIT), Dhaka University and Md. Abul Kalam Azad, Head Of Information Security, Eastern Bank PLC answered the participants questions.

As special guest Abu Sayed Md. Kamruzzaman, ndc Director General, National Cyber Security Agency highlighted the importance of cyber security on Bangladesh perspective. He said, the agency is working tirelessly for the betterment of the country to secure the cyber space.

In the speech of chief guest Shish Hyder Chowdhury, ndc, Secretary, ICT Division said, to secure Bangladesh digitally is prime concern of interim Government. We are finding way to work collaboratively to protect our digital space. We follow up various act, rules or framework how it can be modernized to be time equipped.

The event was organized by Infosecbulletin in collaboration with national cyber security agency (NCSA). To make the conference a success, Fiber@home participated as title sponsor, ADN Group and brilliant cloud as platinum sponsor and SmartData sponsored as gold sponsor category.

(InfoSecCon-2024, 1st edition link)

Shared responsibility is a must ensuring digital space safety

Check Also

Thorium

CISA unveils open-sources Thorium platform for malware, forensic analysis

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) announced today that Thorium, an open-source platform …

Leave a Reply

Your email address will not be published. Required fields are marked *